Identity crisis: war stories from authentication failures

By Vishal Chauhan on 23 Sep 2019 @ Rootcon
πŸ“Š Presentation πŸ“Ή Video πŸ”— Link
#authentication #identity-management #vulnerability-assessment #bug-bounty #iam #web-security
Focus Areas: πŸ” Application Security , πŸͺͺ Identity & Access Management , 🎯 Penetration Testing , πŸ” Vulnerability Management , 🌐 Web Application Security

Presentation Material

Abstract

Your online identity has become one of your most valuable assets. Identity vulnerabilities can let attackers completely masquerade as you online: access your personal information, your social media, online banking, and more.

In this talk, we will explore some of the vulnerabilities that Microsoft has observed related to online identity compromise and the approaches we’ve taken to address these issues. These examples will demonstrate how you might approach searching for other vulnerabilities in the identity space and the bug bounty programs that exist to support these efforts.

AI Generated Summary

The provided transcript consists almost entirely of audio cues such as [Applause], [Music], and fragmented, inaudible speech. No coherent technical content, research topic, findings, tools, or practical implications are present in the text. The only discernible phrases are isolated and nonsensical in context (e.g., “why go,” “so what the chair”). Consequently, it is impossible to extract a factual, technical summary of a talk’s subject matter, key findings, or takeaways from this material. The transcript appears to be either severely corrupted, incomplete, or a recording of non-speech audio, and contains no information suitable for the requested security research archive summary.
Disclaimer: This summary was auto-generated from the video transcript using AI and may contain inaccuracies. It is intended as a quick overview β€” always refer to the original talk for authoritative content. Learn more about our AI experiments.